A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems

J Franco, A Aris, B Canberk… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical
Systems (CPS) have become essential for our daily lives in contexts such as our homes …

Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations

N Neshenko, E Bou-Harb, J Crichigno… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted
significant attention from the research community. To this end, several surveys were put …

State-of-the-art survey of artificial intelligent techniques for IoT security

TA Ahanger, A Aljumah, M Atiquzzaman - Computer Networks, 2022 - Elsevier
The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the
innovation community's considerable attention. Several surveys have covered different IoT …

A comprehensive study of the IoT cybersecurity in smart cities

RO Andrade, SG Yoo, L Tello-Oquendo… - IEEE …, 2020 - ieeexplore.ieee.org
Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT),
Cloud Computing, and Artificial Intelligence (AI) to enhance public services management …

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild

MS Pour, A Mangino, K Friday, M Rathbun… - Computers & …, 2020 - Elsevier
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in
consumer and critical infrastructures. The highly heterogeneous nature of IoT devices and …

Data-driven curation, learning and analysis for inferring evolving iot botnets in the wild

MS Pour, A Mangino, K Friday, M Rathbun… - Proceedings of the 14th …, 2019 - dl.acm.org
The insecurity of the Internet-of-Things (IoT) paradigm continues to wreak havoc in
consumer and critical infrastructure realms. Several challenges impede addressing IoT …

A measurement study of iot-based attacks using iot kill chain

J Haseeb, M Mansoori, I Welch - 2020 IEEE 19th International …, 2020 - ieeexplore.ieee.org
Manufacturing limitations, configuration and maintenance flaws associated with the Internet
of Things (IoT) devices have resulted in an ever-expanding attack surface. Attackers exploit …

Designing and evaluating a flexible and scalable HTTP honeypot platform: architecture, implementation, and applications

M Rabzelj, LŠ Južnič, M Volk, A Kos, M Kren, U Sedlar - Electronics, 2023 - mdpi.com
Digitalization of our economy and society has ushered in notable productivity increases but
has also exposed more of our infrastructures and systems to cyberattacks. This trend is …

Are darknets all the same? On darknet visibility for security monitoring

F Soro, I Drago, M Trevisan, M Mellia… - … symposium on local …, 2019 - ieeexplore.ieee.org
Darknets are sets of IP addresses that are advertised but do not host any client or server. By
passively recording the incoming packets, they assist network monitoring activities. Since …

Sanitizing the IoT cyber security posture: An operational CTI feed backed up by Internet measurements

MS Pour, D Watson, E Bou-Harb - 2021 51st Annual IEEE/IFIP …, 2021 - ieeexplore.ieee.org
The Internet-of-Things (IoT) paradigm at large continues to be compromised, hindering the
privacy, dependability, security, and safety of our nations. While the operational security …